Seminar 4/13/11: Composing Rock Music with Genetic Algorithms, Curt Toppin

The basic process of survival of the fittest from Darwin’s theory of evolution can be applied in software settings. The basic structure of rock music makes evaluating the notes for quality structure a relatively simple process, which allows for easy selection of the best sample of music in a generation.  The process of selection and […]

Read more

Seminar 4/6/11: Computer Viruses, Shikhar Rastogi

The term computer virus is derived from and in some sense is analogous to a biological virus. Biological viral infections are spread by the virus injecting its contents into a far larger organism’s cell and then the infected cell is converted into a biological factory producing copies of the virus. Similarly, a computer virus is […]

Read more

Seminar 3/30/11: Network Latency, Tyler Mather

People are always complaining about slow internet speed, or long loading times, but there are some solutions to those problems. Quality of Service and Motion prediction are two methods that can be used to help with network latency issues. Sources: http://www.cnbc.com/id/31331241/The_Next_Generation_of_Gaming_Consoles http://androidforums.com/sprint/237405-comparison-off-all-major-3g-4g-network-speeds.html http://www.informit.com/articles/article.aspx?p=27382&seqNum=3 http://www.gamespot.com/gamespot/features/video/hov/index.html http://en.wikipedia.org/wiki/History_of_video_games

Read more

Seminar 3/9/11: IP Spoofing, Kelly Schafbuch

Internet protocol spoofing is an internet hacking technique that when used effectively can cripple internet sites. The ability to steal another machines identity and use it as your own is a task that is difficult to perform, but if successful is even harder to detect. In order to understand what happens when an IP spoofing […]

Read more

Seminar 12/8/10: Fingers, Eyes, and Sound – An Adventure Through Biometrics, Dustin Green and Mathew Patten

Biometric systems have been in place for thousands of years, from the basic handprint security of ancient China to the Law-Giver II of the fictional universe of “Judge Dredd”. We are going to take our audience on a journey exploring the techniques of biometric identification beginning with hardware design, followed by classification of data and […]

Read more

Seminar 12/1/10: Comparing The Development Of A Robust Website Using Content Management System Versus Client-Side And Server Side Technologies, Raveena Rastogi

Web development is a broad term for the work involved in developing a web site. It includes web design, web content development, client side scripting, server side scripting, web server administration, database development and network security. However for web development as an industry, it is still fairly young compare to others IT fields that have […]

Read more